|Publication number||US7533410 B1|
|Application number||US 09/948,268|
|Publication date||May 12, 2009|
|Filing date||Sep 6, 2001|
|Priority date||Sep 6, 2001|
|Also published as||US7983269, US20090168781|
|Publication number||09948268, 948268, US 7533410 B1, US 7533410B1, US-B1-7533410, US7533410 B1, US7533410B1|
|Inventors||Kwok T. Fung, Denny Ko, Emmanuel K. Sam, Fang Wu, Eberhard F. Wunderlich|
|Original Assignee||At & T Corp.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (11), Non-Patent Citations (1), Referenced by (11), Classifications (16), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates generally to the provision of voice Virtual Private Network (VPN) services and more specifically to the provision of voice VPN services over an Internet Protocol (IP) network.
There currently exists a number of applications based on technologies that are implemented in various enterprise and carrier environments. These relevant technologies include transport-layer IP VPNs, Voice VPNs with E.164 numbering, and Enterprise VoIP networks.
A transport-layer IP VPN enables a network administration to use a shared network to offer a customer service that emulates the characteristics of a private network (such as performance, reliability, security and QoS) for the customer. An example of where a VPN has seen application is in areas where a person is working remotely from his or her office. The person can connect to a VPN over a public network, such as the Internet, and be connected with the office intranet, and thus have access to networked drives or printers as if the person were in the office. State-of-the-art technologies that are used to implement IP VPNs include MPLS, and IP tunneling protocols such as L2TP.
Voice VPNs with E.164 numbering implemented in a Public Switched Telephone Network (PSTN) typically provide customers with special customer-specific capabilities such as private numbering plan and various enhanced features such as follow me, call forwarding, etc. Other voice VPNs that are implemented using SINA (Static Integrated Network Arrangement) arrangements or private lines typically have features that are limited to capabilities supported by the customers' connected PBXs.
An enterprise VoIP network typically deploys pairs of LADs (Integrated Access Devices) in customer sites to integrate voice and data using technologies ranging from TDM (Time Division Multiplexing) to packetization technologies such as AAL2 (ATM Adaptation Layer 2).
Many of these technologies have been successfully utilized in the implementation of small-scale enterprise networks. However, the application of most of these technologies in a carrier environment to provide comprehensive voice and integrated voice and data services is still very much lacking.
It would, therefore, be desirable to provide an architecture that allows a carrier to provide full capability voice VPN services to multiple customers over a common shared packet network.
An architecture is presented which enables a service provider to support public voice VPN services over an IP VPN network. The architecture utilizes a customer VPN, a designated gateway for the customer VPN, an IP VPN transport network, and a Call Control Element/router Complex which uses IP technology to map between the IP VPN and the voice VPN. With such an arrangement the customer VPN is extended to the Call Control Element, thereby enabling the provision of voice VPN services over an IP network.
The invention will be more fully understood from the following detailed description taken in conjunction with the accompanying drawing, in which:
Recent advances in packetized voice technologies have made it possible for companies to implement low-cost intra-company voice services. These packetized voice technologies also enable carriers to offer cost-effective integrated voice and data services to both business and commercial customers. These emerging technologies include encoding schemes such as 6.723.1, G.729a and G.729e for increased voice compression, as well as transport protocols such as MPLS (Multiprotocol Label Switching) for supporting classes of services, better QoS (Quality of Service) handling and network engineering.
The present invention provides an architecture and methodology that enable a carrier to support public voice VPN (Virtual Private Network) services over an IP VPN network. This architecture is based on an effective, convergent application of a number of technologies to allow a carrier to provide full-capability voice VPN services to multiple customers over a common shared packet network.
The first major component of the architecture are the customer VPNs 20, 21 and 22. Each customer VPN is defined by the networking capabilities for a customer to support intracompany or inter-company multimedia (voice, data and video) applications (including black phones, IP phones, H.323 terminals, etc.). Each customer location is represented as a corresponding one of IP subnet 30-38 of the customer's VPN domain and the subnets together form the customer's enterprise network. Each customer network subnet has a respective one of H.323 Gateways (GWs) 40-48 that also acts as an IP border gateway (BGP) router to the IP VPN transport backbone network 50. This configuration allows the customer VPN to be identified uniquely by an AS (Autonomous System) number. As shown in
The second major component of the architecture is the IP VPN transport network 50 which provides backbone connectivity for the customer's subnetworks through the use of, for example, ATM PVCs. A PVC is a permanent virtual circuit that is permanently available. The IP VPN transport network maps the customer AS numbers contained in the Border Gateway Protocol (BGP) messages into unique connection group identifiers.
The third major component of the architecture is the Call Agent/Call Control Element/Router Complex (CA/CCE) 60. The CA/CCE/router Complex 60 includes a router 61, a CA/CCE (Gatekeeper in the case of H.323) 62, and a VPN Management Information Base (MIB) 63-65 for each customer. The CA/CCE 60 provides call signaling and control functionality and supports per-VPN E.164 to/from IP address translation or mapping.
Per-customer numbering plans and IP address spaces are considered independent of each other so that, e.g., IP address spaces could overlap. The CA/CCE/router Complex 60 maintains a per-VPN MIB for customer VPN management and control. The VPN management information base and its maintenance are part of a service creation environment that functions as an extension of the proposed architecture to provide advanced customer voice VPN features. The CA/CCE/router Complex supports IP tunneling (e.g., using L2TP) and uses this to map between IP VPN and voice VPN by passing AS and VPN information between the router and the Gatekeeper. Each customer VPN thus has a permanent virtual circuit (PVC) extending from the customer VPN to the gatekeeper 62 of the CA/CCE/Router Complex 60.
The architecture of the present invention supports an innovative end-to-end VPN identification mechanism to effectively map a customer's VPN into a customer VPN MIB in the Gatekeeper so that customer-dependent call control is conveniently accomplished. This mechanism is based on a method that effectively implements an end-to-end VPN by converging on the following state-of-the-art technologies: the routing protocol BGP that supports the communication among Autonomous Systems and conveys unique AS numbers, any IP VPN technology such as MPLS and an IP tunneling technology such as L2TP to allow a customer's VPN to be extended between the customer's equipment and the gatekeeper.
Each customer VPN is identified by its unique AS number that is passed between the customer's subnet (Gateway) and the IP VPN transport network. The IP VPN transport network maps each AS number into a connection (e.g., ATM PVC) group to identify the customer's VPN. During call signaling and control message exchanges, the router 61 at the Gatekeeper/Router complex 60 uses an IP tunneling protocol (e.g., L2TP) to pass this AS/connection VPN information to the Gatekeeper to allow the Gatekeeper to perform VPN management and control.
The following are some key benefits provided by the proposed architecture. The architecture leverages proven state-of-the-art technologies. The architecture supports VPNs that involve overlapping private IP addressing for multiple customers (key to the support of IP phones, IP terminals, etc.). The architecture can be adapted to any carrier's existing IP transport network (such as an MPLS network over frame relay, ATM, or an IP network with DiffServ). The architecture can effectively utilize any QoS support from the IP VPN transport network. The proposed architecture together with the end-to-end VPN identification mechanism represents a new invention that allows a carrier to implement and offer large-scale public voice VPN services using such VoIP state-of-the-art technologies as H.323, SIP, xGCP and H.248.
A specific example of how the present system supports public voice VPN services over an IP VPN network will now be described. This example is presented for explanation purposes and is not intended to limit the scope of the invention to the specific embodiment described. A call originates from customer subnet k within the Customer 1 VPN 20. The call is sent through the customer subnet k gateway to the IP VPN 50. The IP VPN 50 transports the call to the gatekeeper 62 of the gatekeeper/router complex 60. The call will have an AS number associated with it, and the AS number is transported with the call. The AS number associated with the call is used to index into the customer k VPN MIB to determine how the call is to be processed. In this instance the call is to be forwarded to subnet 2 of the customer 1 VPN 20, which is different from the original subnet k specified in the call. The corresponding customer MIB indicated in the call needs to be forwarded to a different destination within the Customer 1 VPN 20.
As described above, the architecture enables a service provider to support public voice VPN services over an IP VPN network. The architecture utilizes a customer VPN, a designated gateway for the customer VPN, an IP VPN, and a control/router element which uses IP technology to map between the IP VPN and the voice VPN. With such an arrangement, the customer VPN is extended to the gatekeeper of the control/router element, thereby enabling the provision of voice VPN services over an IP network.
Having described preferred embodiments of the invention, it will now become apparent to those of ordinary skill in the art that other embodiments incorporating these concepts may be used. Additionally, the software included as part of the invention may be embodied in a computer program product that includes a computer useable medium. For example, such a computer usable medium can include a readable memory device, such as a hard drive device, a CD-ROM, a DVD-ROM, or a computer diskette, having computer readable program code segments stored thereon. The computer readable medium can also include a communications link, either optical, wired, or wireless, having program code segments carried thereon as digital or analog signals. Accordingly, it is submitted that the invention should not be limited to the described embodiments but rather should be limited only by the spirit and scope of the appended claims. All publications and references cited herein are expressly incorporated herein by reference in their entirety.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6092113||Aug 28, 1997||Jul 18, 2000||Kokusai Denshin Denwa, Co., Ltd.||Method for constructing a VPN having an assured bandwidth|
|US6154465||Oct 6, 1998||Nov 28, 2000||Vertical Networks, Inc.||Systems and methods for multiple mode voice and data communications using intelligenty bridged TDM and packet buses and methods for performing telephony and data functions using the same|
|US6205488||Nov 13, 1998||Mar 20, 2001||Nortel Networks Limited||Internet protocol virtual private network realization using multi-protocol label switching tunnels|
|US6208658||Sep 25, 1998||Mar 27, 2001||Vertical Networks, Inc.||Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same|
|US6222826||Nov 19, 1997||Apr 24, 2001||Lucent Technologies Inc.||Multimedia calling method and apparatus|
|US6226748||Jun 12, 1997||May 1, 2001||Vpnet Technologies, Inc.||Architecture for virtual private networks|
|US6614781 *||Nov 20, 1998||Sep 2, 2003||Level 3 Communications, Inc.||Voice over data telecommunications network architecture|
|US20010026537 *||Feb 23, 2001||Oct 4, 2001||Michael Massey||Satellite internet backbone network system using virtual onboard switching|
|US20010043571 *||Mar 26, 2001||Nov 22, 2001||Saqib Jang||Multiple subscriber videoconferencing system|
|US20030031165 *||Aug 10, 2001||Feb 13, 2003||O'brien James D.||Providing voice over internet protocol networks|
|US20030191841 *||May 15, 2001||Oct 9, 2003||Deferranti Marcus||Communication system and method|
|1||*||Hawkinson et al., "Guidelines for creation, selection, and registration of an autonomous system (AS)", Network Working Group, Mar. 1996 pp. 1-9.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7873060 *||Oct 18, 2008||Jan 18, 2011||Fortinet, Inc.||Accelerating data communication using tunnels|
|US7983269 *||Mar 4, 2009||Jul 19, 2011||At&T Intellectual Property Ii, L.P.||Architecture to support public voice VPN services over an IP network|
|US8155122 *||Dec 21, 2007||Apr 10, 2012||Verizon Business Global Llc||Linking autonomous systems with dual premise routing domains|
|US8503332||Nov 30, 2010||Aug 6, 2013||Fortinet, Inc.||Accelerating data communication using tunnels|
|US8713669 *||Mar 2, 2007||Apr 29, 2014||Cisco Technology, Inc.||Multi-domain dynamic group virtual private networks|
|US20060274723 *||Jun 1, 2005||Dec 7, 2006||Cisco Technology, Inc.||Method and system for customer-managed call routing|
|US20080095157 *||Dec 21, 2007||Apr 24, 2008||Verizon Business Global Llc||Linking autonomous systems with dual premise routing domains|
|US20080215880 *||Mar 2, 2007||Sep 4, 2008||Cisco Technology, Inc.||Multi-domain dynamic group virtual private networks|
|US20090168781 *||Mar 4, 2009||Jul 2, 2009||Fung Kwok T||Architecture to support public voice vpn services over an ip network|
|US20100098092 *||Oct 18, 2008||Apr 22, 2010||Fortinet, Inc. A Delaware Corporation||Accelerating data communication using tunnels|
|US20110069715 *||Nov 30, 2010||Mar 24, 2011||Fortinet, Inc.||Accelerating data communication using tunnels|
|U.S. Classification||726/15, 370/351, 379/901, 713/153, 726/14, 379/900, 713/150|
|Cooperative Classification||Y10S379/901, Y10S379/90, H04L65/1069, H04M7/006, H04L63/0272|
|European Classification||H04L63/02C, H04L29/06M2S1, H04M7/00M|
|Jan 24, 2011||AS||Assignment|
Owner name: AT&T PROPERTIES, LLC, NEVADA
Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:AT&T CORP.;REEL/FRAME:025683/0165
Effective date: 20101130
|Jan 25, 2011||AS||Assignment|
Owner name: AT&T INTELLECTUAL PROPERTY II, L.P., NEVADA
Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:AT&T PROPERTIES, LLC;REEL/FRAME:025693/0972
Effective date: 20101130
|Oct 4, 2012||FPAY||Fee payment|
Year of fee payment: 4
|Oct 27, 2016||FPAY||Fee payment|
Year of fee payment: 8